Skip to main content

CVE-1999-0228: Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

Medium
VulnerabilityCVE-1999-0228cve-1999-0228denial of service
Published: Fri Feb 07 1997 (02/07/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:11:22 UTC

Technical Analysis

CVE-1999-0228 is a denial of service (DoS) vulnerability affecting the RPCSS.EXE program, also known as the RPC Locator service, in Microsoft Windows NT version 4.0. The Remote Procedure Call (RPC) Locator service is responsible for managing RPC endpoint mappings, which are essential for the communication between distributed applications on Windows networks. This vulnerability allows an unauthenticated remote attacker to cause the RPC Locator service to crash or become unresponsive, leading to a denial of service condition. The CVSS base score of 5.0 (medium severity) reflects that the attack vector is network-based (AV:N), requires no authentication (Au:N), has low attack complexity (AC:L), and impacts availability only (A:P), without affecting confidentiality or integrity. Since the vulnerability dates back to 1997 and affects Windows NT 4.0, a legacy operating system, no patches are available, and no known public exploits have been reported in the wild. The attack would typically involve sending specially crafted network packets to the RPC Locator service, causing it to fail and disrupt RPC communications on the affected system. This could impact services relying on RPC, potentially causing system instability or service outages.

Potential Impact

For European organizations, the impact of this vulnerability is primarily limited to environments still running Windows NT 4.0, which is an obsolete and unsupported operating system. In such legacy systems, exploitation could lead to denial of service conditions, disrupting critical RPC-dependent services such as distributed application communication, network management, and system administration tasks. This could result in operational downtime and loss of availability for affected services. However, given the age of the vulnerability and the obsolescence of Windows NT 4.0, the practical risk is low for most modern European enterprises. Organizations with legacy industrial control systems, embedded devices, or specialized applications that still rely on Windows NT 4.0 could face service interruptions if targeted. The lack of patches and mitigations increases the risk for these legacy environments, but the absence of known exploits reduces the likelihood of widespread attacks.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigation strategies: 1) Upgrade or migrate legacy Windows NT 4.0 systems to supported and secure operating systems to eliminate exposure. 2) If upgrading is not immediately feasible, isolate Windows NT 4.0 systems from untrusted networks by implementing network segmentation and strict firewall rules to block unsolicited inbound traffic to RPC services. 3) Disable the RPC Locator service if it is not required for operational purposes to reduce the attack surface. 4) Monitor network traffic for unusual or malformed RPC requests that could indicate attempted exploitation. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting anomalous RPC traffic patterns. 6) Maintain robust incident response plans to quickly address any service disruptions caused by potential exploitation attempts.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de64e

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:11:22 AM

Last updated: 8/2/2025, 6:50:51 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats